11-11-2014 06:27 AM - edited 02-21-2020 07:55 PM
Hi Everyone
I am struggling with this since last 10 days and don't have any clue where it is going wrong. Hoping someone could help me in configuring it.
We have Cisco ASA - 5515-X running and recently I have enabled the Remote Access VPN with the below configuration.
I am able to connect successfully and also able to ping the vpn ( which is inside) interface but cannot ping or reach the rest of the network/hosts in the LAN. I have also tried with different VPNClient Pools ( For e.g. 192.168.x.x) but ended up same.
The localhosts I am trying to ping from VPN client are reachable from ASA so not sure if it is a routing issue.
Am I missing something here?
=====================================================================================
: Saved
:
: Hardware: ASA5515, 8192 MB RAM, CPU Clarkdale 3059 MHz, 1 CPU (4 cores)
:
ASA Version 9.2(2)8
!
hostname asa
domain-name dc.example.com
enable password 07tqp.CdgjzuHukL encrypted
xlate per-session deny tcp any4 any4
xlate per-session deny tcp any4 any6
xlate per-session deny tcp any6 any4
xlate per-session deny tcp any6 any6
xlate per-session deny udp any4 any4 eq domain
xlate per-session deny udp any4 any6 eq domain
xlate per-session deny udp any6 any4 eq domain
xlate per-session deny udp any6 any6 eq domain
passwd 5F.543RuZ7rxXSzi encrypted
names
ip local pool VPNClient 10.16.254.67-10.16.254.126 mask 255.255.255.0
!
interface GigabitEthernet0/0
channel-group 1 mode active
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/1
channel-group 1 mode active
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/2
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/3
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/4
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/5
shutdown
no nameif
no security-level
no ip address
!
interface Management0/0
management-only
nameif management
security-level 100
ip address 10.16.0.23 255.255.255.0
!
interface Port-channel1
lacp max-bundle 8
no nameif
no security-level
no ip address
!
interface Port-channel1.2001
vlan 2001
nameif out
security-level 0
ip address xx.xx.xx.202 255.255.255.252
ospf cost 20
ospf priority 10
ospf hello-interval 1
!
interface Port-channel1.2011
vlan 2011
nameif vpn
security-level 100
ip address 10.16.254.66 255.255.255.192
ospf cost 11
ospf hello-interval 1
!
interface Port-channel1.2012
vlan 2012
nameif dmz
security-level 25
ip address xx.xx.xx.205 255.255.255.252
ospf cost 21
ospf hello-interval 1
!
boot system disk0:/asa922-8-smp-k8.bin
ftp mode passive
dns domain-lookup vpn
dns server-group DefaultDNS
name-server 10.17.0.67
name-server 10.17.0.68
domain-name dc.example.com
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
object network inside_nw
subnet 10.0.0.0 255.0.0.0
object network vpn_local
subnet 10.16.254.64 255.255.255.192
object-group icmp-type DM_INLINE_ICMP_1
icmp-object echo
icmp-object time-
access-list vpn_access_in extended permit ip any4 any4
access-list vpn_access_in extended permit ip any any
access-list out_access_in extended deny udp any any eq ntp
access-list out_access_in extended permit ip any4 any4
access-list out_access_in extended permit ip any any log
access-list out_access_in extended permit icmp any4 any object-group DM_INLINE_ICMP_1
access-list DefaultRAGroup_splitTunnelAcl standard permit 10.0.0.0 255.0.0.0
access-list vpn_traffic standard permit 10.16.254.0 255.255.255.0
access-list dmz_access_in extended permit ip any any
access-list crypto_map_acl extended permit ip any object inside_nw
mtu management 1500
mtu out 1500
mtu vpn 1500
mtu dmz 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-731-101.bin
arp timeout 14400
no arp permit-nonconnected
nat (vpn,out) source static inside_nw inside_nw destination static inside_nw inside_nw route-lookup
access-group out_access_in in interface out
access-group vpn_access_in in interface vpn
access-group dmz_access_in in interface dmz
router ospf 1
router-id 0.0.1.3
network 10.16.254.64 255.255.255.192 area 0
network xx.xx.xx.200 255.255.255.252 area 0
network xx.xx.xx.204 255.255.255.252 area 0
area 0
route vpn 10.0.0.0 255.0.0.0 10.16.254.65 1
sysopt connection tcpmss 1300
sysopt noproxyarp out
sysopt noproxyarp vpn
crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport
crypto ipsec security-association pmtu-aging infinite
crypto dynamic-map out_dyn_map 65535 set ikev1 transform-set ESP-AES-256-SHA-TRANS ESP-AES-256-SHA ESP-3DES-SHA-TRANS ESP-3DES-SHA
crypto dynamic-map out_dyn_map 65535 set reverse-route
crypto ca trustpool policy
crypto ikev1 enable out
crypto ikev1 policy 10
authentication crack
encryption aes-256
hash sha
group 2
lifetime 86400
management-access vpn
no threat-detection basic-threat
no threat-detection statistics access-list
no threat-detection statistics tcp-intercept
group-policy DefaultRAGroup internal
group-policy DefaultRAGroup attributes
vpn-tunnel-protocol l2tp-ipsec ssl-client
group-policy GroupPolicyRAX internal
group-policy GroupPolicyRAX attributes
dns-server value 10.17.0.67 10.17.0.68
vpn-tunnel-protocol ikev1 l2tp-ipsec
split-tunnel-policy tunnelspecified
split-tunnel-network-list value DefaultRAGroup_splitTunnelAcl
default-domain value dc.example.com
tunnel-group DefaultRAGroup general-attributes
address-pool VPNClient
authentication-server-group LDAPX
default-group-policy GroupPolicyRAX
tunnel-group DefaultRAGroup ipsec-attributes
ikev1 pre-shared-key *****
tunnel-group DefaultRAGroup ppp-attributes
authentication pap
no authentication chap
no authentication ms-chap-v1
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect ip-options
inspect icmp
inspect http
inspect pptp
inspect icmp error
!
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
Cryptochecksum:d0fd790b4e98e246f3059fcea8023e69
: end
11-11-2014 06:34 AM
I am concerned that when I try to reach any internal host through VPN : decaps are being increased but encap is zero always.
# sh crypto ipsec sa
interface: out
Crypto map tag: out_dyn_map, seq num: 65535, local addr: xx.xx.xx.202
local ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)
remote ident (addr/mask/prot/port): (10.16.254.67/255.255.255.255/0/0)
dynamic allocated peer ip: 10.16.254.67
dynamic allocated peer ip(ipv6): 0.0.0.0
#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0
#pkts decaps: 4, #pkts decrypt: 4, #pkts verify: 4
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0
#pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0
#PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0
#TFC rcvd: 0, #TFC sent: 0
#Valid ICMP Errors rcvd: 0, #Invalid ICMP Errors rcvd: 0
#send errors: 0, #recv errors: 0
Also dropped packets
# sh asp drop frame
Flow is denied by configured rule (acl-drop) 33
FP L2 rule drop (l2_acl) 3318
Interface is down (interface-down) 4
Last clearing: Never
11-13-2014 02:36 PM
Anyone please ?
02-17-2015 11:43 AM
Hi, did anyone find a solution for this?
I am having the same issue on the same ASA model.
11-19-2014 04:48 AM
Good document , you might find your solution in this one :
http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/81824-common-ipsec-trouble.html?referring_site=RE&pos=1&page=http://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/5409-ipsec-debug-00.html
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide